Data processing: software development – installation – and managem – Software program development tool – Testing or debugging
Reexamination Certificate
2002-05-22
2009-08-18
Dam, Tuan Q (Department: 2192)
Data processing: software development, installation, and managem
Software program development tool
Testing or debugging
C717S102000, C717S121000, C726S024000
Reexamination Certificate
active
07577941
ABSTRACT:
Controls of interest are indentified by determining which installed software objects associated with the application of interest exhibit certain characteristics, such as being publicly creatable, being designated as safe, and providing a security-related interface. Once the controls of interest are identified from the installed software objects, information associated with each control is obtained and stored. Each time the software program of interest is modified and re-installed, the information is updated to reflect the modifications. Additional information is also stored with the information. The information and the additional information may be provided to a browser for display and may be modified by a user to describe a present state associated with the control of interest (i.e., tested, untested).
REFERENCES:
patent: 6092194 (2000-07-01), Touboul
patent: 6151643 (2000-11-01), Cheng et al.
patent: 6298478 (2001-10-01), Nally et al.
patent: 6314565 (2001-11-01), Kenner et al.
patent: 6370569 (2002-04-01), Austin
patent: 6473800 (2002-10-01), Jerger et al.
patent: 6662217 (2003-12-01), Godfrey et al.
patent: 6691176 (2004-02-01), Narin et al.
patent: 6698013 (2004-02-01), Bertero et al.
patent: 6718549 (2004-04-01), Narin et al.
patent: 6802061 (2004-10-01), Parthasarathy et al.
patent: 2002/0107809 (2002-08-01), Biddle et al.
“A Comparison between Java and ActiveX Security”, D. Hopwood, Oct. 1997, pp. 1-9. Online retrieved at <http://www.users.zetnet.co.uk/hopwood/papers/compsec97.html>.
“Data Mining Methods for Detection of New Malicious Executables”, Eskin et al., May 2001, pp. 38-49. Online retrieved at <http://ieeexplore.ieee.org/stamp
umber=924286&isnumber=19992>.
“A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents”, Sedaghat et al., Jul. 2001, pp. 330-337. Online retrieved at <http://ieeexplore.ieee.org/stamp
umber=942281&isnumber=20395>.
Slayden, April et al., “A Web Tool For Generic Design”, The Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, Nov. 27-29, 2001, pp. 85-88.
Sami, Mohammed et al., “Test Framework for Interfaces: A Pragmatic Approach”, Proceedings of the 15th International Conference and Exposition on Testing Computer Software, Jun. 8-21, 1998, pp. 43-46.
Akhtar Imran
Gallagher Thomas P.
Landauer Lawrence G.
Dam Tuan Q
Dao Thuy
Merchant & Gould P.C.
Microsoft Corporation
LandOfFree
System and method for identifying potential security risks... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for identifying potential security risks..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for identifying potential security risks... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4072650